homeblog aboutcontact

the fathom whitepaper:


Fathom is a decentralized protocol to create meaningful credentials through the consensus of knowledge communities. Currently, most credentials rely on being backed by large institutions in order to be meaningful, which has led towards credentials that can be conveniently mass-customized and issued. This left most people in a situation where they can only reliably communicate a small part of their skill-set as dictated by the institutions. With fathom, anyone can create a credential for any kind of skill. In order to earn that credential, the fathom protocol defines an assessment-game, where the truthful evaluation of an applicant’s skill is the schelling point. The economic incentivization of the fathom protocol makes users congregate around credentials that are well defined, in that they allow individuals to play the assessment game with a positive outcome. As such any community of any field can create their own credentials, use them in order to self-organize more effectively and its members can independently communicate their skills to the outside world.

Table of Contents

1. Introduction
       1.1 Problem Statement
       1.2 Introducing Fathom
       1.3 Outline
2. The Fathom Protocol
       2.1 Architecture Overview
             2.1.1 Concept
             2.1.2 The Concept Tree
             2.1.3 The Assessment Game
       2.2 Assessment Process
             2.2.1 Setup
             2.2.2 Assessment of the Candidate
             2.2.3 Committing a Score
             2.2.4 Steal and Reveal
             2.2.5 Determining the Outcome
             2.2.6 Payout of Assessors
3. Security
       3.1 Incentive Structure
             3.1.1 Incentives to Confirm or Decline an Assessment
             3.1.2 Incentives for Assessors to Grade Truthfully
       3.1 Attack Vectors
             3.2.1 Sybil Attacks
             3.2.2 Simple Trolling
             3.2.2 P+epsilon Attack
4. Vision